2. Cyber crime refers to any crime that involves a computer and a network.
Net crime refers to criminal exploitation of the Internet.
Cybercrimes are defined as: "Offences that are committed against individuals
or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm to the victim directly
or indirectly, using modern telecommunication networks such as Internet (Chat
rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)"
3. Such crimes may threaten a nation’s security and financial
health.
can create cross border tensions.
also known as CYBER TERRORISM
4. CRIMES THAT PRIMARILY TARGET COMPUTER
NETWORKS OR DEVICES INCLUDE:
Computer viruses
Denial-of-service attacks
Malware (malicious code)
5. CRIMES THAT USE COMPUTER NETWORKS OR
DEVICES TO ADVANCE OTHER ENDS INCLUDE:
Cyberstalking
Fraud and identity theft
Information warfare
Phishing scams
6. COMPUTER VIRUS
A computer virus is a computer program that can
replicate itself and spread from one computer to another.
Viruses can increase their chances of spreading to other
computers by infecting files on a network file system or
a file system that is accessed by other computers.
7. DENIAL-OF-SERVICE ATTACK (DOS ATTACK)
OR DISTRIBUTED DENIAL-OF-SERVICE
ATTACK (DDOS ATTACK)
It is an attempt to make a computer or network resource
unavailable to its intended users.
Although the means to carry out, motives for, and targets of a
DoS attack may vary, it generally consists of the concerted
efforts of a person, or multiple people to prevent
an Internet site or service from functioning efficiently or at all,
temporarily or indefinitely.
Perpetrators of DoS attacks typically target sites or services
hosted on high-profile web servers such as banks, credit card
payment gateways, and even root name servers
8. MALWARE
Malware is a general term used to describe any kind of
software or code specifically designed to exploit a
computer, or the data it contains, without consent.
Malware includes computer viruses, worms, trojan
horses, spyware adware most rootkits and other
malicious programs
9. CYBER STALKING
Stalking is a form of mental assault, in which the
perpetrator repeatedly, unwantedly, and disruptively
breaks into the life-world of the victim, with whom he
has no relationship (or no longer has), with motives that
are directly or indirectly traceable to the affective
sphere. Moreover, the separated acts that make up the
intrusion cannot by themselves cause the mental abuse,
but do taken together (cumulative effect).
10. FRAUD
a fraud is an intentional deception made for personal
gain or to damage another individual; the related
adjective is fraudulent.
Defrauding people or entities of money or valuables is
a common purpose of fraud, but there have also been
fraudulent "discoveries", e.g., in science , to gain
prestige rather than immediate monetary gain.
11. IDENTITY THEFT
Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by
assuming that person's identity, typically in order to
access resources or obtain credit and other benefits in
that person's name.
12. INFORMATION WARFARE
The term Information Warfare (IW) is primarily an
American concept involving the use and management of
information technology in pursuit of a competitive
advantage over an opponent. Information warfare may
involve collection of tactical
information, assurance(s) that one's own information is
valid, spreading
of propagandaor disinformation to demoralize or
manipulate the enemy
13. PHISHING
Phishing is a way of attempting to acquire information
such as usernames, passwords and credit card details by
masquerading as a trustworthy entity in an electronic
communication.
Communications purporting to be from popular social
web sites, auction sites, online payment processors or IT
administrators are commonly used to lure the
unsuspecting public.
14. HOW TO SAVE YOURSELF FROM CYBER
THEFT
First of all keep updating your email passwords in
every 2 months.
Secondly don’t keep your private informations on
public websites or social websites.
Activate double security system in emails and net
banking.
Don’t give you’re a/c no and passwords to unknown
websites.
15. ANTI CYBER CRIME
Anti cyber crime organisations are contineously working
to track these hackers and provide better security
solotions.